Frost and Sullivan Finds US Airport Perimeter Security Market in Decline

Frost and Sullivan Finds US Airport Perimeter Security Market in Decline

The U.S. airport perimeter security market may have reached its saturation point. Most fence upgrades for perimeter control are small opportunities handled by local vendors. Security enhancements are the driving factor that will continue to open prospects into this niche market, although these are mainly implemented in larger airports.

New analysis from Frost & Sullivan, U.S. Airport Perimeter Security, finds that the Federal Aviation Administration (FAA) invested an estimated $58 million in grants toward the market through its Airport Improvement Programs (AIP) in 2012. Future funding toward airport perimeter security, though, is expected to decline through 2017. Additionally, the perimeter control segment, consisting of fences and gates, is at an oversupplied point.

The physical size and location of airports make it difficult to provide adequate and effective security. Companies have failed to succeed in offering airports an effective, reliable, and cost-effective integrated security system that is suitable to airports of all sizes. Most tailored security systems designed for large airports still experience vulnerability gaps due to factors caused by human error.

“Some airports, such as John F. Kennedy (JFK) International Airport in New York, are on a waterfront and easy to approach with a small boat,” said Frost & Sullivan Aerospace & Defense Senior Industry Analyst, John Hernandez. “Post 9/11, new security measures were put into effect to protect these airports. Despite these measures, in August 2012, a man whose Jet Ski stopped working decided to swim ashore to JFK Airport, climbed an eight-foot barbed-wire perimeter fence and walked through the airport's $100 million perimeter intrusion detection system and across two runways undetected until he reached an airline terminal.”

Airport perimeter security technologies are only as good as the people who manage and operate them. Continued mishaps may prompt the advent of automated, unmanned systems as a solution to eliminate human error.

“Terrorism and unlawful intrusion are the primary causes driving the demand for effective perimeter security equipment,” said Hernandez. “According to reports from the government, the Transportation Security Administration (TSA) had not conducted vulnerability assessments for 87 percent of the close to 450 U.S. airports regulated by TSA for security in 2009. The lack of these assessments creates uncertainty around the physical security effectiveness of those airports."

To view the video on Frost & Sullivan’s U.S. Airport Perimeter Security analysis, click here.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3